default search action
34th DBSec 2020: Regensburg, Germany
- Anoop Singhal, Jaideep Vaidya:
Data and Applications Security and Privacy XXXIV - 34th Annual IFIP WG 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25-26, 2020, Proceedings. Lecture Notes in Computer Science 12122, Springer 2020, ISBN 978-3-030-49668-5
Network and Cyber-Physical Systems Security
- Nawaf Alhebaishi, Lingyu Wang, Sushil Jajodia:
Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV). 3-23 - Luis Carlos Suárez, David Espes, Frédéric Cuppens, Cao-Thanh Phan, Philippe Bertin, Philippe Le Parc:
Managing Secure Inter-slice Communication in 5G Network Slice Chains. 24-41 - Andy Dolan, Indrakshi Ray, Suryadipta Majumdar:
Proactively Extracting IoT Device Capabilities: An Application to Smart Homes. 42-63 - Daniel Schlette, Florian Menges, Thomas Baumer, Günther Pernul:
Security Enumerations for Cyber-Physical Systems. 64-76
Information Flow and Access Control
- Joachim Biskup:
Inference-Proof Monotonic Query Evaluation and View Generation Reconsidered. 79-99 - Manel Smine, David Espes, Nora Cuppens-Boulahia, Frédéric Cuppens:
Network Functions Virtualization Access Control as a Service. 100-117 - Marian Zaki, Adam J. Lee, Panos K. Chrysanthis:
Effective Access Control in Shared-Operator Multi-tenant Data Stream Management Systems. 118-136 - Sandip Ghosal, R. K. Shyamasundar:
Information Flow Security Certification for SPARK Programs. 137-150
Privacy-Preserving Computation
- Marius Stübs, Tobias Mueller, Kai Bavendiek, Manuel Lösch, Sibylle Schupp, Hannes Federrath:
Provably Privacy-Preserving Distributed Data Aggregation in Smart Grids. 153-173 - Anselme Tueno, Yordan Boev, Florian Kerschbaum:
Non-interactive Private Decision Tree Evaluation. 174-194 - Rudolf Mayer, Markus Hittmeir, Andreas Ekelhart:
Privacy-Preserving Anomaly Detection Using Synthetic Data. 195-207 - Jeyamohan Neera, Xiaomin Chen, Nauman Aslam, Zhan Shu:
Local Differentially Private Matrix Factorization with MoG for Recommendations. 208-220
Visualization and Analytics for Security
- Fabian Böhm, Ludwig Englbrecht, Günther Pernul:
Designing a Decision-Support Visualization for Live Digital Forensic Investigations. 223-240 - Yoram J. Meijaard, Bram C. M. Cappers, Josh G. M. Mengerink, Nicola Zannone:
Predictive Analytics to Prevent Voice over IP International Revenue Sharing Fraud. 241-260 - Amir Lukach, Ehud Gudes, Asaf Shabtai:
PUA Detection Based on Bundle Installer Characteristics. 261-273 - Andreas Schaad, Dominik Binder:
ML-Supported Identification and Prioritization of Threats in the OVVL Threat Modelling Tool. 274-285
Spatial Systems and Crowdsourcing Security
- Sina Shaham, Gabriel Ghinita, Cyrus Shahabi:
Enhancing the Performance of Spatial Queries on Encrypted Data Through Graph Embedding. 289-309 - Farnaz Tahmasebian, Li Xiong, Mani Sotoodeh, Vaidy S. Sunderam:
Crowdsourcing Under Data Poisoning Attacks: A Comparative Study. 310-332 - Tran Phuong Thao, Mhd Irvan, Ryosuke Kobayashi, Rie Shigetomi Yamaguchi, Toshiyuki Nakata:
Self-enhancing GPS-Based Authentication Using Corresponding Address. 333-344
Secure Outsourcing and Privacy
- Radu Ciucanu, Pascal Lafourcade:
GOOSE: A Secure Framework for Graph Outsourcing and SPARQL Evaluation. 347-366 - Fahad Shaon, Murat Kantarcioglu:
SGX-IR: Secure Information Retrieval with Trusted Processors. 367-387 - Barbara Krumay, Jennifer Klar:
Readability of Privacy Policies. 388-399
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.